{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2005-2491","title":"Title"},{"category":"description","text":"Integer overflow in pcre_compile.c in Perl Compatible Regular Expressions (PCRE) before 6.2, as used in multiple products such as Python, Ethereal, and PHP, allows attackers to execute arbitrary code via quantifier values in regular expressions, which leads to a heap-based buffer overflow.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2005-2491","url":"https://www.suse.com/security/cve/CVE-2005-2491"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 106209 for CVE-2005-2491","url":"https://bugzilla.suse.com/106209"},{"category":"external","summary":"SUSE Bug 112651 for CVE-2005-2491","url":"https://bugzilla.suse.com/112651"},{"category":"external","summary":"SUSE Bug 115570 for CVE-2005-2491","url":"https://bugzilla.suse.com/115570"},{"category":"external","summary":"SUSE Bug 118279 for CVE-2005-2491","url":"https://bugzilla.suse.com/118279"},{"category":"external","summary":"SUSE Bug 325921 for CVE-2005-2491","url":"https://bugzilla.suse.com/325921"},{"category":"external","summary":"Advisory link for SUSE-SA:2005:048","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BQYYBGU3WDXUGW4TONYZEM4WX7PWRX6Y/#BQYYBGU3WDXUGW4TONYZEM4WX7PWRX6Y"},{"category":"external","summary":"Advisory link for SUSE-SA:2005:049","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/YGNWX7FFPGHZOZ3MKK7X7VWUUE26EON2/#YGNWX7FFPGHZOZ3MKK7X7VWUUE26EON2"},{"category":"external","summary":"Advisory link for SUSE-SA:2005:051","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SYCF5SGLMEYS464XNB4XWFFNLGTIM6GU/#SYCF5SGLMEYS464XNB4XWFFNLGTIM6GU"},{"category":"external","summary":"Advisory link for SUSE-SA:2005:052","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LES453EF7PHEOBJ62FRKJTXPKXRB2X7I/#LES453EF7PHEOBJ62FRKJTXPKXRB2X7I"}],"title":"SUSE CVE CVE-2005-2491","tracking":{"current_release_date":"2023-12-09T03:43:31Z","generator":{"date":"2023-02-15T06:17:50Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2005-2491","initial_release_date":"2023-02-15T06:17:50Z","revision_history":[{"date":"2023-02-15T06:17:50Z","number":"2","summary":"Current version"},{"date":"2023-12-08T05:21:54Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:43:31Z","number":"4","summary":"Current version"}],"status":"interim","version":"4"}}}